Sciweavers

77 search results - page 4 / 16
» Agile Security For Information Warfare: A Call For Research
Sort
View
MIDDLEWARE
2007
Springer
14 years 1 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
CCS
2006
ACM
13 years 10 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
AISS
2010
165views more  AISS 2010»
13 years 4 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
IHI
2012
293views Healthcare» more  IHI 2012»
12 years 2 months ago
iCircos: visual analytics for translational bioinformatics
Translational bioinformatics increasingly involves the discovery of associations between molecular and phenotype information, with the goal of transforming those discoveries into ...
Suresh K. Bhavnani, Mamta Abbas, Vickie McMicken, ...
INFOCOM
2010
IEEE
13 years 5 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...